4.4 Article

A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications

期刊

WIRELESS PERSONAL COMMUNICATIONS
卷 120, 期 4, 页码 2653-2691

出版社

SPRINGER
DOI: 10.1007/s11277-021-08552-7

关键词

Privacy; Security; RFID; IoT; ECC; Implementation

向作者/读者索取更多资源

RFID technology is widely used in the Internet of Things era, but security and privacy issues have always existed. In recent years, researchers have proposed RFID authentication protocols based on elliptic curve cryptography to improve security. This study proposes a secure, privacy-preserving, and efficient ECC-based RFID authentication protocol, achieving the most effective solution in a real-world environment.
Radio frequency identification (RFID) is a promising and widespread wireless communication technology for entity identification or authentication. By the emerging Internet of Things phenomenon, the use of RFID is densely augmenting in various daily life applications. However, RFID systems suffer from security and privacy issues. Recently, many researchers propose RFID authentication protocols based on elliptic curve cryptography (ECC) to efficiently mitigate the aforementioned concerns. In this work, we extensively examine the state-of-the-art RFID authentication protocols based on ECC in terms of security and performance. Some of these works claim that their protocols provide all general security and privacy properties. We revisit Vaudenay's formal privacy model and show that they do not provide forward and/or backward privacy under this model contrary to their claim. Then, we propose a secure, privacy-preserving and efficient ECC based RFID authentication protocol. We also present a security and performance analysis of our proposed protocol and compare it to the existing relevant schemes in detail. Furthermore, we implement our proposal in a real RFID system to demonstrate its practicability. To the best of our knowledge, our proposed scheme is the most efficient ECC based RFID authentication protocol realized in a real-world environment that satisfies all common security and privacy features including backward and forward privacy.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.4
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据